#VU49542 Cleartext storage of sensitive information in TraceTronic ECU-TEST - CVE-2021-21612
Published: January 13, 2021 / Updated: January 14, 2021
TraceTronic ECU-TEST
Jenkins
Description
The vulnerability allows a local user to view the password on the target system.
The vulnerability exists due to the affected software stores credentials unencrypted in its global configuration file "de.tracetronic.jenkins.plugins.ecutest.report.atx.installation.ATXInstallation.xml" on the Jenkins controller. A local user with access to the Jenkins controller file system can obtain credentials.